General

  • Target

    7668b4f124d00c48ac9c4ecad5d14d40d4c0bc71eb98979a3ca0adb1c276ed37

  • Size

    292KB

  • Sample

    220725-ag2m4sehdm

  • MD5

    620399ca3fa933940813332a6aa2d003

  • SHA1

    838b5bf26b4b18bf7bf531164ad659771bcdb136

  • SHA256

    7668b4f124d00c48ac9c4ecad5d14d40d4c0bc71eb98979a3ca0adb1c276ed37

  • SHA512

    81c620b98ab7c179f5373d335472936209215133df9655166d276798069b0341fb51d59f7e2860839f92b67aeb9ed28bd019e915f0d533707ec6ebe8edd8c3f5

Malware Config

Targets

    • Target

      7668b4f124d00c48ac9c4ecad5d14d40d4c0bc71eb98979a3ca0adb1c276ed37

    • Size

      292KB

    • MD5

      620399ca3fa933940813332a6aa2d003

    • SHA1

      838b5bf26b4b18bf7bf531164ad659771bcdb136

    • SHA256

      7668b4f124d00c48ac9c4ecad5d14d40d4c0bc71eb98979a3ca0adb1c276ed37

    • SHA512

      81c620b98ab7c179f5373d335472936209215133df9655166d276798069b0341fb51d59f7e2860839f92b67aeb9ed28bd019e915f0d533707ec6ebe8edd8c3f5

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks